96 resultados para Distinguishing Attack
Resumo:
Uranium-Plutonium mixed carbide with a Pu/(U+Pu) ratio of 0.55 is to be used as the fuel in the Fast Breeder Test Reaotor - (PBTRj at Kalpakkam, India. carbur ization of the stainlese steel clad by this fuel is determined by its carbon potential. - i. Because the carbon potential of this fuel composition is not 1 available in the literature, it was meadured by the methanehydrogen gas equilibration technique. The sample was equilibrated with purified hydrogen and the equilibrium methane-tohydrogen ratio in the gas phase was measured with a flame ionization detector. The carbon potential of the ThC-ThCz as well as Mo-Mo2C system,whiah is an important binary in the aotinide-fission product-carbon systems, were also measured by this technique, in the temperature range 973 K to 1173 K. The data for ! the Mo-MozC system are in agreement with values reported in the literature. The results for the ThC-ThC2 system are different from estimated values with large unaertainty limits given in the literature. The data on (U,Pu) mixed carbide indicates possibility of stainlesss steel clad attack under isothermal equilibrium conditions.
Resumo:
A multiple UAV search and attack mission in a battlefield involves allocating UAVs to different target tasks efficiently. This task allocation becomes difficult when there is no communication among the UAVs and the UAVs sensors have limited range to detect the targets and neighbouring UAVs, and assess target status. In this paper, we propose a team theoretic approach to efficiently allocate UAVs to the targets with the constraint that UAVs do not communicate among themselves and have limited sensor range. We study the performance of team theoretic approach for task allocation on a battle field scenario. The performance obtained through team theory is compared with two other methods, namely, limited sensor range but with communication among all the UAVs, and greedy strategy with limited sensor range and no communication. It is found that the team theoretic strategy performs the best even though it assumes limited sensor range and no communication.
Resumo:
A study is made of the rotation field in wedge indentation of metals using copper as the model material system. Wedges with apical angles of 60 and 120 are used to indent annealed copper, and the deformation is mapped using image correlation. The indentation of annealed and strain-hardened copper is simulated using finite element analysis. The rotation field, derived from the deformation measurements, provides a clear way of distinguishing between cutting and compressive modes of deformation. Largely unidirectional rotation on one side of the symmetry line with small spatial rotation gradients is characteristic of compression. Bidirectional rotation with neighboring regions of opposing rotations and locally high rotation gradients characterizes cutting. In addition, the rotation demarcates such characteristic regions as the pile-up zone in indentation of a strain-hardened metal. The residual rotation field obtained after unloading is essentially the same as that at full load, indicating that it is a scalar proxy for plastic deformation as a whole.
Resumo:
Rathour RK, Narayanan R. Influence fields: a quantitative framework for representation and analysis of active dendrites. J Neurophysiol 107: 2313-2334, 2012. First published January 18, 2012; doi:10.1152/jn.00846.2011.-Neuronal dendrites express numerous voltage-gated ion channels (VGICs), typically with spatial gradients in their densities and properties. Dendritic VGICs, their gradients, and their plasticity endow neurons with information processing capabilities that are higher than those of neurons with passive dendrites. Despite this, frameworks that incorporate dendritic VGICs and their plasticity into neurophysiological and learning theory models have been far and few. Here, we develop a generalized quantitative framework to analyze the extent of influence of a spatially localized VGIC conductance on different physiological properties along the entire stretch of a neuron. Employing this framework, we show that the extent of influence of a VGIC conductance is largely independent of the conductance magnitude but is heavily dependent on the specific physiological property and background conductances. Morphologically, our analyses demonstrate that the influences of different VGIC conductances located on an oblique dendrite are confined within that oblique dendrite, thus providing further credence to the postulate that dendritic branches act as independent computational units. Furthermore, distinguishing between active and passive propagation of signals within a neuron, we demonstrate that the influence of a VGIC conductance is spatially confined only when propagation is active. Finally, we reconstruct functional gradients from VGIC conductance gradients using influence fields and demonstrate that the cumulative contribution of VGIC conductances in adjacent compartments plays a critical role in determining physiological properties at a given location. We suggest that our framework provides a quantitative basis for unraveling the roles of dendritic VGICs and their plasticity in neural coding, learning, and homeostasis.
Resumo:
Most bacterial genomes harbor restriction-modification systems, encoding a REase and its cognate MTase. On attack by a foreign DNA, the REase recognizes it as nonself and subjects it to restriction. Should REases be highly specific for targeting the invading foreign DNA? It is often considered to be the case. However, when bacteria harboring a promiscuous or high-fidelity variant of the REase were challenged with bacteriophages, fitness was maximal under conditions of catalytic promiscuity. We also delineate possible mechanisms by which the REase recognizes the chromosome as self at the noncanonical sites, thereby preventing lethal dsDNA breaks. This study provides a fundamental understanding of how bacteria exploit an existing defense system to gain fitness advantage during a host-parasite coevolutionary ``arms race.''
Resumo:
TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Attacker traceback is a promising solution which allows a victim to identify the exact location of the attacker and hence enables the victim to take proper countermeasure near attack origins, for forensics and to discourage attackers from launching the attacks. However, attacker traceback in MANET is a challenging problem due to dynamic network topology, limited network and host resources such as memory, bandwidth and battery life. We introduce a novel method of TCP attacker Identification in MANET using the Traffic History - MAITH. Based on the comprehensive evaluation based on simulations, we showed that MAITH can successfully track down the attacker under diverse mobile multi-hop network environment with low communication, computation, and memory overhead.
Resumo:
A comprehensive study of D-Na center dot center dot center dot A (D = H/F) complexes has been done using advanced ab initio and atoms in molecule (AIM) theoretical analyses. The correlation between electron density at bond critical point and binding energy gives a distinguishing feature for hydrogen bonding, different from the `electrostatic complexes' formed by LiD and NaD. Moreover, the LiD/NaD dimers have both linear and anti-parallel minima, as expected for electrostatic dipole-dipole interactions. The HF dimer has a quasi-linear minimum and the anti-parallel structure is a saddle point. Clearly, characterizing hydrogen bonding as `nothing but electrostatic interaction between two dipoles' is grossly in error.
Resumo:
In the present work, we experimentally study and demarcate the stall flutter boundaries of a NACA 0012 airfoil at low Reynolds numbers (Re similar to 10(4)) by measuring the forces and flow fields around the airfoil when it is forced to oscillate. The airfoil is placed at large mean angle of attack (alpha(m)), and is forced to undergo small amplitude pitch oscillations, the amplitude (Delta alpha) and frequency (f) of which are systematically varied. The unsteady loads on the oscillating airfoil are directly measured, and are used to calculate the energy transfer to the airfoil from the flow. These measurements indicate that for large mean angles of attack of the airfoil (alpha(m)), there is positive energy transfer to the airfoil over a range of reduced frequencies (k=pi fc/U), indicating that there is a possibility of airfoil excitation or stall flutter even at these low Re (c=chord length). Outside this range of reduced frequencies, the energy transfer is negative and under these conditions the oscillations would be damped. Particle Image Velocimetry (PIV) measurements of the flow around the oscillating airfoil show that the shear layer separates from the leading edge and forms a leading edge vortex, although it is not very clear and distinct due to the low oscillation amplitudes. On the other hand, the shear layer formed after separation is found to clearly move periodically away from the airfoil suction surface and towards it with a phase lag to the airfoil oscillations. The phase of the shear layer motion with respect to the airfoil motions shows a clear difference between the exciting and the damping case.
Resumo:
In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
Heat transfer rates measured in front and to the side of a protrusion on an aluminum flat plate subjected to hypersonic flow at zero angle of attack are presented for two flow enthalpies of approximately 2 MJ/kg and 4.5 MJ/kg. Experiments were conducted in the hypersonic shock tunnel (HST2) and free piston driven HST3 at a freestream Mach number of 8. Heat transfer data was obtained for different geometries of the protrusion of a height of 4 mm, which is approximately the local boundary layer thickness. Comparatively high rates of heat transfer were obtained at regions of flow circulation in the separated region, with the hottest spot generally appearing in front of the protuberance. Experimental values showed moderate agreement with existing empirical correlations at higher enthalpy but not at all for the lower enthalpy condition, although the correlations were coined at enthalpy values nearer to the lower value. Schlieren visualization was also done to investigate the flow structures qualitatively.
Resumo:
In this paper, the sliding mode control based guidance laws to intercept stationary targets at a desired impact time are proposed. Then, it is extended to constant velocity targets using the notion of predicted interception. The desired impact time is achieved by selecting the interceptor's lateral acceleration to enforce a sliding mode on a switching surface designed using non-linear engagement dynamics. Numerical simulation results are presented to validate the proposed guidance law for different initial engagement geometries, impact times and salvo attack scenarios
Resumo:
Experiments were conducted to measure the heat flux in the vicinity of a three-dimensional protuberance placed on a flat plate facing a hypersonic flow at zero angle of attack. The effects of flow enthalpy and height of the protuberance on the interference heating in its vicinity were studied. Evidence of disturbed flow with highly three-dimensional characteristics and heightened vorticity was observed near the protrusion. A parametric study by changing the deflection angle of the protuberance was also made. Correlations exist in the open literature for enthalpy values lower than 2 MJ/kg. This effort has yielded a new correlation that is valid for enthalpies up to 6 MJ/kg. The Z-type schlieren technique was used to visualize the flow features qualitatively for one of the flow conditions studied.
Resumo:
Anaplastic astrocytoma (AA; Grade III) and glioblastoma (GBM; Grade IV) are diffusely infiltrating tumors and are called malignant astrocytomas. The treatment regimen and prognosis are distinctly different between anaplastic astrocytoma and glioblastoma patients. Although histopathology based current grading system is well accepted and largely reproducible, intratumoral histologic variations often lead to difficulties in classification of malignant astrocytoma samples. In order to obtain a more robust molecular classifier, we analysed RT-qPCR expression data of 175 differentially regulated genes across astrocytoma using Prediction Analysis of Microarrays (PAM) and found the most discriminatory 16-gene expression signature for the classification of anaplastic astrocytoma and glioblastoma. The 16-gene signature obtained in the training set was validated in the test set with diagnostic accuracy of 89%. Additionally, validation of the 16-gene signature in multiple independent cohorts revealed that the signature predicted anaplastic astrocytoma and glioblastoma samples with accuracy rates of 99%, 88%, and 92% in TCGA, GSE1993 and GSE4422 datasets, respectively. The protein-protein interaction network and pathway analysis suggested that the 16-genes of the signature identified epithelial-mesenchymal transition (EMT) pathway as the most differentially regulated pathway in glioblastoma compared to anaplastic astrocytoma. In addition to identifying 16 gene classification signature, we also demonstrated that genes involved in epithelial-mesenchymal transition may play an important role in distinguishing glioblastoma from anaplastic astrocytoma.
Resumo:
n this paper, three-axis autopilot of a tactical flight vehicle has been designed for surface to air application. Both nonlinear and linear design synthesis and analysis have been carried out pertaining to present flight vehicle. Lateral autopilot performance has been compared by tracking lateral acceleration components along yaw and pitch plane at higher angles of attack in presence of side force and aerodynamic nonlinearity. The nonlinear lateral autopilot design is based on dynamic inversion and time scale separation principle. The linear lateral autopilot design is based on three-loop topology. Roll autopilot robustness performance has been enhanced against unmodeled roll disturbances by backstepping technique. Complete performance comparison results of both nonlinear and linear controller based on six degrees of freedom simulation along with stability and robustness studies with respect to plant parameter variation have been discussed in the paper.
Resumo:
In this paper, the approach for assigning cooperative communication of Uninhabited Aerial Vehicles (UAV) to perform multiple tasks on multiple targets is posed as a combinatorial optimization problem. The multiple task such as classification, attack and verification of target using UAV is employed using nature inspired techniques such as Artificial Immune System (AIS), Particle Swarm Optimization (PSO) and Virtual Bee Algorithm (VBA). The nature inspired techniques have an advantage over classical combinatorial optimization methods like prohibitive computational complexity to solve this NP-hard problem. Using the algorithms we find the best sequence in which to attack and destroy the targets while minimizing the total distance traveled or the maximum distance traveled by an UAV. The performance analysis of the UAV to classify, attack and verify the target is evaluated using AIS, PSO and VBA.